start page | rating of books | rating of authors | reviews | copyrights

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: E

e class : sendmail, 32.5. Alphabetized Reference
E configuration command : sendmail, 22.2.1. The E Configuration Command
e flag
sendmail, 23.6.1. Periodically with -q
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
E flag : sendmail, 30.8. Alphabetized F= Flags
E line (host status file) : sendmail, B.1. Status file lines
E line (qf file) : sendmail, 23.9. The qf File Internals
$e macro : (see SmtpGreetingMessage option)
$E macro : sendmail, 31.10. Alphabetized Reference
e option : (see ErrorMode (e) option)
E option : (see ErrorHeader (E) option)
-e switch (sendmail) : sendmail, 36.7. Alphabetized Reference
-E switch (sendmail) : sendmail, 36.7. Alphabetized Reference
E= equate : sendmail, 30.4. The Equates
earthquakes : Practical UNIX & Internet Security, 12.2.1.4. Earthquake
eavesdropping
Practical UNIX & Internet Security, 12.3.1. Eavesdropping
Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
Practical UNIX & Internet Security, 12.4.1.2. Potential for eavesdropping and data theft
Practical UNIX & Internet Security, 14.4.4. Protecting Against Eavesdropping
Practical UNIX & Internet Security, 14.4.4.2. Protection against eavesdropping
Practical UNIX & Internet Security, 16.3.1. Link-level Security
IP packets
Building Internet Firewalls, 10.1.2. Packet Sniffing
Practical UNIX & Internet Security, 16.3.1. Link-level Security
Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
through log files : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
on the Web
Practical UNIX & Internet Security, 18.4. Avoiding the Risks of Eavesdropping
Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
X clients : Practical UNIX & Internet Security, 17.3.21.2. X security
EBCDIC : sendmail, 30.8. Alphabetized F= Flags
ECB (electronic code book)
Practical UNIX & Internet Security, 6.4.4.2. DES modes
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
echo command : Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
Echo Message
TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
TCP/IP Network Administration, 7.2. The Minimal Routing Table
ECPA (Electronic Communications Privacy Act) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
edit FYIs (For Your Information) : TCP/IP Network Administration, 13.7. Summary
editing Makefile file : sendmail, 2.4. Preliminaries
editing wtmp file : Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
editors : Practical UNIX & Internet Security, 11.5.2.7. Other initializations
buffers for : Practical UNIX & Internet Security, 11.1.4. Trojan Horses
Emacs : Practical UNIX & Internet Security, 11.5.2.3. GNU .emacs
ex
Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
Practical UNIX & Internet Security, 11.5.2.4. .exrc
Practical UNIX & Internet Security, 11.5.2.7. Other initializations
startup file attacks : Practical UNIX & Internet Security, 11.5.2.4. .exrc
vi
Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
Practical UNIX & Internet Security, 11.5.2.4. .exrc
Practical UNIX & Internet Security, 11.5.2.7. Other initializations
edquota command : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
EDS : Practical UNIX & Internet Security, F.3.4.11. EDS and EDS customers worldwide
edu domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
EF_DELETE_BCC flag : sendmail, 23.9. The qf File Internals
EF_HAS8BIT flag : sendmail, 23.9. The qf File Internals
EF_NO_BODY_RETN flag : sendmail, 20.2.1. Accept Mail Only From Our Domain
EF_RESPONSE flag : sendmail, 23.9. The qf File Internals
EF_WARNING flag : sendmail, 23.9. The qf File Internals
effective UIDs/GIDs
Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
Practical UNIX & Internet Security, 5.5. SUID
Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
EGP (Exterior Gateway Protocol)
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
TCP/IP Network Administration, 11.9. Simple Network Management Protocol
neighbors : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
statement (in gated) : TCP/IP Network Administration, B.8.6. The egp Statement
EHLO command (SMTP)
sendmail, 4.2. Verbose (-v)
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
TCP/IP Network Administration, 10.8. Testing sendmail.cf
EightBitMode encoding
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
8mm video tape : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
electrical fires
Practical UNIX & Internet Security, 12.2.1.2. Smoke
(see also fires; smoke and smoking)
electronic breakins : (see breakins; cracking)
electronic code book (ECB)
Practical UNIX & Internet Security, 6.4.4.2. DES modes
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
electronic mail
sendmail, 1. Introduction
(see email)
addresses : (see addresses)
messages : (see messages)
electrical noise : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
electronic sabotage : (see denial of service)
ElGamal algorithm
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
elm (mail system) : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
emacs editor : Practical UNIX & Internet Security, 11.5.2.7. Other initializations
.emacs file : Practical UNIX & Internet Security, 11.5.2.3. GNU .emacs
email
Building Internet Firewalls, 2.1. Electronic Mail
Building Internet Firewalls, 5.6. Selecting Services Provided by the
Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
TCP/IP Network Administration, 1.7. Application Layer
(see also addresses)
(see also mail, servers)
(see also sendmail)
accepted by programs : Practical UNIX & Internet Security, 17.3.4.1. sendmail and security
action, in Swatch program : Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
addresses
Building Internet Firewalls, 2.7. Information About People
TCP/IP Network Administration, 13.3.1. archie
alias back door : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
aliases
TCP/IP Network Administration, 10.3. sendmail Aliases
(see aliases/aliasing)
Archie access via : Building Internet Firewalls, 8.7.3.3. Providing Archie service to your
bombs : sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
configuring : Building Internet Firewalls, 8.1. Electronic Mail
copyrights on : Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
delivering : TCP/IP Network Administration, 1.7. Application Layer
delivery agents (MTAs)
Building Internet Firewalls, 8.1. Electronic Mail
sendmail, 1.1. MUA Versus MTA
sendmail, 5.3.1. Mail Delivery Agents
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 30. Delivery Agents
(see also M configuration command)
$# operator and
sendmail, 9.2.1. The Delivery Agent ($#)
sendmail, 28.6.5. Specify a Delivery Agent: $#
advantages to sendmail : sendmail, 18.1. To Use or Not to Use
choosing
sendmail, 9. Rule Set 0
sendmail, 9.5. Things to Try
declaring : sendmail, 19.3.2. MAILER()
default : sendmail, 34.8. Alphabetized Reference
equates for : sendmail, 30.4. The Equates
for errors : sendmail, 9.4. The error Delivery Agent
expensive
sendmail, 23.6.1. Periodically with -q
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
flags
sendmail, 6.3. The local Delivery Agent
sendmail, 6.4. Add the Missing Parts to Mhub
sendmail, 14.2. Headers Versus Delivery Agent Flags
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.4. ?flags? in Header Definitions
ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
local
sendmail, 6.3. The local Delivery Agent
sendmail, 19.6. Alphabetized m4 Macros
logging : sendmail, 26.1.3.4. mailer= the delivery agent used
printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
as recipients : sendmail, 30.8. Alphabetized F= Flags
scripts via : sendmail, 24.3. Write a Delivery Agent Script
statistics : (see statistics)
symbolic name : sendmail, 30.2. The Symbolic Name
testing : sendmail, 38.5.6. Try a Delivery Agent with /try
UUCP : sendmail, 19.4.6. UUCP
Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
ESMTP (Extended SMTP)
sendmail, 4.2. Verbose (-v)
sendmail, 23.9. The qf File Internals
sendmail, 30.8. Alphabetized F= Flags
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
TCP/IP Network Administration, 10.8. Testing sendmail.cf
BODY parameter (ESMTP)
sendmail, 31.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
private extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
file transfers : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
firewalls : Practical UNIX & Internet Security, 21.4.2. Electronic Mail
flooding : Building Internet Firewalls, 1.2.1.2. Denial of Service
forwarding (UUCP) : Practical UNIX & Internet Security, 15.6.1. Mail Forwarding for UUCP
gateway : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
growing importance of : TCP/IP Network Administration, 9.7.2. IMAP Server
harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
logging : Practical UNIX & Internet Security, 10.4.2. Mail
mailing lists, firewalls resources via : Building Internet Firewalls, A.3. Mailing Lists
messages
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
assigning priority to : TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
blank lines ending : sendmail, 30.8. Alphabetized F= Flags
body of
sendmail, 1.6. The Body
sendmail, 23.2.2. The Data (Message Body) File: df
(see also -B switch (sendmail))
bouncing
sendmail, 10.3. Missing Addresses
sendmail, 13.2.2. Limit the Life of Queued Messages
sendmail, 14.4. Precedence
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 22.8.3.4. The PostmasterCopy option
sendmail, 23.3.6. Savemail Panic
sendmail, 23.7.1. Handling a Down Site
sendmail, 24.4.1. The Postmaster Alias
sendmail, 25.5.1. Reply Versus Bounce
sendmail, 25.5.3. A list-bounced Alias
sendmail, 34.8. Alphabetized Reference
sendmail, 35.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
(see also $n macro)
content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
converting between 7- and 8-bit : sendmail, 18.8. Alphabetized Reference
delivering : (see delivery)
envelope : (see envelope)
encapsulated : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
error : (see errors)
flooding : Practical UNIX & Internet Security, 25.3.2. Message Flooding
forged : sendmail, 22.7. Forged Mail
forwarding : sendmail, 35.7. Forwarding with Resent-Headers
forwarding loops : sendmail, 25.7.2. Forwarding Loops
headers for : (see headers, message)
holding : (see queue)
hop count : (see hop count)
hub's acceptance of : sendmail, 15.4. Hub Accepts Mail for Client
leading dots in : sendmail, 34.8. Alphabetized Reference
limiting size of : sendmail, 20.2.3. Limit the Size of Guest Messages
multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
multiple objects in single : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
origin date of : (see $a macro)
priority of
sendmail, 14.4. Precedence
(see priority, message)
processing limits on : sendmail, 23.5. How the Queue Is Processed
queue
sendmail, 1.3.2. The Queue
sendmail, 4.1.2. Show Queue Mode (-bp)
sendmail, 13.2.2. Limit the Life of Queued Messages
sendmail, 23. The Queue
sendmail, 23.2. Parts of a Queued Message
sendmail, 23.2.3.2. Locks shown when printing the queue
sendmail, 23.4. Printing the Queue
sendmail, 23.5. How the Queue Is Processed
sendmail, 23.7.1. Handling a Down Site
sendmail, 23.8. Pitfalls
sendmail, 23.9. The qf File Internals
sendmail, 25.7.6. Force Requeue on Error
sendmail, 34.6.2. The Queue
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
rejecting
sendmail, 18.8. Alphabetized Reference
sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
relays for : sendmail, 19.4.5. Relays
sending
sendmail, 13.4. Sending Mail
sendmail, 14.5. Sending Real Mail
size of
sendmail, 26.1.3.10. size= the size of the message
sendmail, 30.4. The Equates
sendmail, 34.8. Alphabetized Reference
stored in queue in error : sendmail, 23.9. The qf File Internals
time placed in queue : sendmail, 23.9. The qf File Internals
unique identifier for
sendmail, 13.4. Sending Mail
sendmail, 14.2.3. The Message-ID: Header
sendmail, 26.1.3.5. msgid= the Message-ID: identifier
phantom, monitoring : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
processing addresses : TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
queue
sendmail, 1.3.2. The Queue
sendmail, 23. The Queue
checkpointing : sendmail, 34.8. Alphabetized Reference
down sites and : sendmail, 23.7.1. Handling a Down Site
lifetime
sendmail, 13.2.2. Limit the Life of Queued Messages
sendmail, 34.8. Alphabetized Reference
message life : sendmail, 13.2.2. Limit the Life of Queued Messages
message parts : sendmail, 23.2. Parts of a Queued Message
printing
sendmail, 4.1.2. Show Queue Mode (-bp)
sendmail, 23.2.3.2. Locks shown when printing the queue
sendmail, 23.4. Printing the Queue
sendmail, 36.7. Alphabetized Reference
processing
sendmail, 23.5. How the Queue Is Processed
sendmail, 23.9. The qf File Internals
sendmail, 36.7. Alphabetized Reference
putting everything in : sendmail, 34.8. Alphabetized Reference
requeuing on error : sendmail, 25.7.6. Force Requeue on Error
sendmail options for : sendmail, 34.6.2. The Queue
sorting : sendmail, 34.8. Alphabetized Reference
time message placed in : sendmail, 23.9. The qf File Internals
troubleshooting : sendmail, 23.8. Pitfalls
why message is stored in : sendmail, 23.9. The qf File Internals
receiving by sendmail : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
relay : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
for RFCs : TCP/IP Network Administration, 13.4.1. Retrieving RFCs by mail
sendmail
Building Internet Firewalls, 2.1. Electronic Mail
(see also sendmail)
sending via CGI scripts : Practical UNIX & Internet Security, 18.2.3.3. Sending mail
sent directly to file : Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
servers
TCP/IP Network Administration, 3.4. Mail Services
TCP/IP Network Administration, 4.5.3. Planning Your Mail System
interoperability and : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
simplified addresses : TCP/IP Network Administration, 10.5.3. The Define Class Command
SMTP (Simple Mail Transfer Protocol)
Building Internet Firewalls, 2.1. Electronic Mail
Building Internet Firewalls, 5.6. Selecting Services Provided by the
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Building Internet Firewalls, 8.1.1. Simple Mail Transfer Protocol
Practical UNIX & Internet Security, 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
sendmail, 4.2. Verbose (-v)
sendmail, 18.8. Alphabetized Reference
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
commands, listed : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
configuring
Building Internet Firewalls, 8.1.1.6. Configuring SMTP to
Building Internet Firewalls, 9.1.1.3. SMTP
Building Internet Firewalls, 9.2.1.3. SMTP
EHLO command
sendmail, 4.2. Verbose (-v)
sendmail, 34.8. Alphabetized Reference
ETRN command : sendmail, 23.6.2.4. Process the queue via ESMTP ETRN
EXPN command
sendmail, 22.3.2. SMTP vrfy and expn
sendmail, 22.8.3.5. The PrivacyOptions option
Extended : (see ESMTP)
forging mail with : sendmail, 22.7.2. Forging with SMTP
greeting message : sendmail, 31.10. Alphabetized Reference
HELO command
sendmail, 18.8. Alphabetized Reference
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
incoming connection rate : sendmail, 34.8. Alphabetized Reference
MAIL command
sendmail, 29.10.1. The check_mail Rule Set
sendmail, 34.8. Alphabetized Reference
multiple connections : sendmail, 34.8. Alphabetized Reference
multiple timeouts : sendmail, 34.8. Alphabetized Reference
RCPT command
sendmail, 23.9. The qf File Internals
sendmail, 29.10.2. The check_rcpt Rule Set
sendmail, 36.7. Alphabetized Reference
refusing on high load : sendmail, 34.8. Alphabetized Reference
running on stdin : sendmail, 36.7. Alphabetized Reference
sendmail and : TCP/IP Network Administration, 10.1. sendmail's Function
service extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
SMTP probes : sendmail, 22.3. SMTP Probes
standardizing on : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
status codes : sendmail, B.1. Status file lines
for UNIX : (see Sendmail)
VRFY command
sendmail, 22.3.2. SMTP vrfy and expn
sendmail, 22.8.3.5. The PrivacyOptions option
sendmail, 30.8. Alphabetized F= Flags
startup file attacks : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
tracing intruders : Building Internet Firewalls, 13.3. Pursuing and Capturing the
transport agents (MTAs) : (see delivery agents)
user agents : (see MUAs)
embedded commands : (see commands)
embezzlers : Practical UNIX & Internet Security, 11.3. Authors
emergencies : (see disasters and disaster recovery)
emergency response organizations : (see response teams)
employees
Practical UNIX & Internet Security, 11.3. Authors
Practical UNIX & Internet Security, 13. Personnel Security
Practical UNIX & Internet Security, 13.3. Outsiders
departure of : Practical UNIX & Internet Security, 13.2.6. Departure
phonebook of : Practical UNIX & Internet Security, 12.3.3. Other Media
security checklist for : Practical UNIX & Internet Security, A.1.1.12. Chapter 13: Personnel Security
targeted in legal investigation : Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target
trusting : Practical UNIX & Internet Security, 27.3.1. Your Employees?
written authorization for : Practical UNIX & Internet Security, 26.2.6. Other Tips
empty
email addresses
sendmail, 10.3. Missing Addresses
sendmail, 17.1.1.3. Handle null address
sendmail, 30.8. Alphabetized F= Flags
sendmail.cf file : sendmail, 5.2. The Minimal File
encapsulation
Building Internet Firewalls, 6.3. What Does a Packet Look Like?
Building Internet Firewalls, C.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
of datagrams : TCP/IP Network Administration, 1.4. Network Access Layer
of mail messages : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
encoding
sendmail, 30.8. Alphabetized F= Flags
sendmail, 32.5. Alphabetized Reference
data : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
text
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
TCP/IP Network Administration, 12.6. Encryption
"Encrypted:" header line : sendmail, 35.10. Alphabetized Reference
encryption
Practical UNIX & Internet Security, 6.2. What Is Encryption?
Practical UNIX & Internet Security, 6.2.2. The Elements of Encryption
Practical UNIX & Internet Security, 12.2.6.2. Encryption
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
TCP/IP Network Administration, 6.3.4. PPP Daemon Security
TCP/IP Network Administration, 12.6. Encryption
(see also cryptography)
algorithms
Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
Practical UNIX & Internet Security, 6.6. Encryption Programs Available for UNIX
Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
crypt
Practical UNIX & Internet Security, 6.6.1. UNIX crypt: The Original UNIX Encryption Command
Practical UNIX & Internet Security, 6.6.1.3. Example
Digital Signature Algorithm
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
ElGamal : Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
IDEA : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
RC2, RC4, and RC5
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
ROT13 : Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
RSA
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
application-level
Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt?
Practical UNIX & Internet Security, 16.3.1. Link-level Security
of backups
Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
Practical UNIX & Internet Security, 12.3.2.4. Backup encryption
checklist for : Practical UNIX & Internet Security, A.1.1.5. Chapter 6: Cryptography
Data Encryption Standard (DES)
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.4.4. DES
Practical UNIX & Internet Security, 6.4.5.2. Triple DES
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
DCE and : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Diffie-Hellman : (see Diffie-Hellman key exchange system)
end-to-end : Practical UNIX & Internet Security, 16.3.1. Link-level Security
Enigma system
Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
Practical UNIX & Internet Security, 6.6.1.1. The crypt program
(see also crypt command/algorithm)
escrowing keys
Practical UNIX & Internet Security, 6.1.3. Modern Controversy
Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
of executables : Building Internet Firewalls, 5.8.2.2. How to disable services
exporting software : Practical UNIX & Internet Security, 26.4.1. Munitions Export
of hypertext links : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
key distribution : Building Internet Firewalls, 10.5.4. Key Distribution
laws about
Practical UNIX & Internet Security, 6.7. Encryption and U.S. Law
Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
link-level : Practical UNIX & Internet Security, 16.3.1. Link-level Security
of modems : Practical UNIX & Internet Security, 14.6. Additional Security for Modems
multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Netscape Navigator system : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
with network services : Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
network-level : Building Internet Firewalls, 10.5. Network-Level Encryption
one-time pad mechanism : Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
packet filtering perimeter and : Building Internet Firewalls, 10.5.3. Where Do You Encrypt?
of passwords
Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
PGP : (see PGP)
private-key
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
TCP/IP Network Administration, 12.6. Encryption
public-key
Building Internet Firewalls, 10. Authentication and Inbound
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
TCP/IP Network Administration, 12.6. Encryption
breaking : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
PGP : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
proving identity with : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
RC4 and RC5 algorithms : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
references on : Practical UNIX & Internet Security, D.1.5. Cryptography Books
Skipjack algorithm : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
superencryption : Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
and superusers : Practical UNIX & Internet Security, 6.2.4. Why Use Encryption with UNIX?
of time-stamp : Building Internet Firewalls, 10.2.2. Something You Know
uses for : TCP/IP Network Administration, 12.6. Encryption
of Web information : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
end systems : (see hosts)
end-of-line string : sendmail, 30.4. The Equates
end-to-end
data encryption
Practical UNIX & Internet Security, 16.3.1. Link-level Security
TCP/IP Network Administration, 12.6. Encryption
routes
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
TCP/IP Network Administration, B.10. Control Statements
Energy Sciences Network (ESnet) : Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
Enigma encryption system
Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
Practical UNIX & Internet Security, 6.6.1.1. The crypt program
enriched text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
enterprise
networks
Practical UNIX & Internet Security, 16.1. Networking
TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
subnets : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
enterpriseSpecific trap : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
ENVDEF= directive : sendmail, 18.4.2. ENVDEF=
envelope
sendmail, 1.7. The Envelope
sendmail, 8.2. Why Rules?
DSN ENVID identifier
sendmail, 23.9. The qf File Internals
sendmail, 36.7. Alphabetized Reference
logging sender of : sendmail, 26.1.3.3. from= show envelope sender
masquerading : sendmail, 19.6. Alphabetized m4 Macros
original DSN : sendmail, 31.10. Alphabetized Reference
rewriting address of : sendmail, 29.3.1. V8 Enhancements
specifying recipient's address : sendmail, 29.10.2. The check_rcpt Rule Set
UDB rewrite on : sendmail, 30.8. Alphabetized F= Flags
ENVELOPE *e structure : sendmail, 20.1.1. Arguments Passed to checkcompat()
${envid} macro : sendmail, 31.10. Alphabetized Reference
environment variables
Practical UNIX & Internet Security, 11.5.2.7. Other initializations
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
sendmail, 5.3.12. Environment variables
sendmail, 22.2. The Environment
sendmail, 36.4.2.1. Initialize the environment
E configuration command : sendmail, 22.2.1. The E Configuration Command
environment, physical
Practical UNIX & Internet Security, 12.2.1. The Environment
Practical UNIX & Internet Security, 12.2.1.13. Environmental monitoring
equal-cost multi-path routing : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
equates
sendmail, 30.4. The Equates
(see also under specific equate)
equivalent hosts : TCP/IP Network Administration, 12.2.5. Secure the r Commands
erasing disks : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
erotica, laws governing : Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
ERRLIST_PREDEFINED macro : sendmail, 18.8. Alphabetized Reference
errno variable : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
errno.h file : sendmail, B.1. Status file lines
error messages
ErrorHeader (E) option : sendmail, 34.8. Alphabetized Reference
ErrorMode (e) option
sendmail, 34.1.3. Appropriateness of Options
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
errors
Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
sendmail, 26.1. Logging with syslog
sendmail, 36.5.5. EX_OSERR A System Resource Error
(see also exit signal)
(see also logs/logging)
in ACLs : Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
addressing : sendmail, 8.2. Why Rules?
building with m4 : sendmail, 19.2. Build with m4
configuration : Practical UNIX & Internet Security, 9.1. Prevention
correction, not provided in SLIP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
delivery agent for
sendmail, 9.4. The error Delivery Agent
sendmail, 30.5.2. The error Delivery Agent
delivery failure count : sendmail, 23.9. The qf File Internals
detection
TCP/IP Network Administration, 1.5.1. Internet Protocol
TCP/IP Network Administration, 11.8. Protocol Case Study
end-to-end : TCP/IP Network Administration, 1.6. Transport Layer
DNS error numbers : sendmail, B.1. Status file lines
error message header : sendmail, 34.8. Alphabetized Reference
human
Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
ICMP codes for : Building Internet Firewalls, 6.4.2. Returning ICMP
illegal command-line switches : sendmail, 36.7. Alphabetized Reference
List:; form addresses
sendmail, 17.1.2.1. A rule to handle List:;
sendmail, 17.3. Rule Set 0
MIME format : sendmail, 34.8. Alphabetized Reference
overwriting rule sets : sendmail, 8.4. Rules
recovery from : TCP/IP Network Administration, 1.5.1. Internet Protocol
requeuing in response to : sendmail, 25.7.6. Force Requeue on Error
rule set 0 for : sendmail, 17.3. Rule Set 0
on sending errors : sendmail, 34.8. Alphabetized Reference
in sendmail.cf file : sendmail, 5.1. Overview
suppressing messages : sendmail, 12.2. The File Form of Class
temporary : sendmail, 36.5.8. EX_TEMPFAIL A Recoverable Error
UNIX error number : sendmail, B.1. Status file lines
"Errors-To:" header line
sendmail, 34.8. Alphabetized Reference
sendmail, 35.10. Alphabetized Reference
escape characters
Practical UNIX & Internet Security, 14.5.3.1. Originate testing
sendmail, 35.3.2. Escape Character in the Header Field
escrowing encryption keys
Practical UNIX & Internet Security, 6.1.3. Modern Controversy
Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
ESMTP (Extended SMTP)
sendmail, 4.2. Verbose (-v)
sendmail, 23.9. The qf File Internals
sendmail, 30.8. Alphabetized F= Flags
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
TCP/IP Network Administration, 10.8. Testing sendmail.cf
BODY parameter (ESMTP)
sendmail, 31.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
private extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
ESnet (Energy Sciences Network) : Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
espionage
Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
Practical UNIX & Internet Security, 11.3. Authors
ESTABLISHED state : TCP/IP Network Administration, B.8.5. The bgp Statement
/etc directory
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 11.5.3.5. System initialization files
backups of : Practical UNIX & Internet Security, 7.1.3. Types of Backups
/etc/aliases file
Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
sendmail, 3.1.1. The Aliases File
sendmail, 22.6. The Aliases File
sendmail, 24.1. The aliases(5) File
sendmail, 24.5. The Aliases Database
sendmail, 33.3.4.1. -A append values for duplicate keys (V8.7 and above)
sendmail, 33.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
TCP/IP Network Administration, 9.3. Network Information Service
in symbol table
sendmail, 24.5.4. No DBM Aliasing
sendmail, 33.8. Alphabetized Reference
/etc/aspppd.cf file : TCP/IP Network Administration, 6.3.6. Solaris PPP
/etc/auto_direct file : TCP/IP Network Administration, 9.1.4. NFS Automounter
/etc/auto_home file : TCP/IP Network Administration, 9.1.4. NFS Automounter
/etc/auto_master file : TCP/IP Network Administration, 9.1.4. NFS Automounter
/etc/bootptab file
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, 9.6.1. rdist
configuration parameters : TCP/IP Network Administration, 9.4.2. BOOTP extensions
updating : TCP/IP Network Administration, 9.4.2. BOOTP extensions
/etc/default/login file : Practical UNIX & Internet Security, 8.5.1. Secure Terminals
/etc/default/passwd file : TCP/IP Network Administration, 12.2.1. The Shadow Password File
/etc/defaultdomain file : TCP/IP Network Administration, 9.3. Network Information Service
/etc/dfs/dfstab file
TCP/IP Network Administration, 9.1.2.1. The share command
TCP/IP Network Administration, 9.1.5.1. NFS print services
/etc/dhcpd.conf file : TCP/IP Network Administration, 9.5.1. dhcpd.conf
/etc/diphosts file : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
/etc/ethers file
TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
TCP/IP Network Administration, 9.3. Network Information Service
TCP/IP Network Administration, 11.4.2.1. ARP problem case study
/etc/exports file
Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
Practical UNIX & Internet Security, 19.3.2.4. Using Secure NFS
Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
TCP/IP Network Administration, 9.1.5.1. NFS print services
/etc/fbtab file : Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
/etc/fingerd program : (see finger service)
/etc/fsck program : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
/etc/fstab file
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
/etc/ftpd : (see ftpd server)
/etc/ftpusers file : Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
/etc/gated.conf file
TCP/IP Network Administration, 7.6. Gateway Routing Daemon
TCP/IP Network Administration, 7.7.1.1. A host configuration
TCP/IP Network Administration, 7.7.2.1. Running gated at startup
/etc/gateways file
TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
/etc/group file
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
Practical UNIX & Internet Security, 4.1.3.1. The /etc/group file
Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
Practical UNIX & Internet Security, 8.1.6. Group Accounts
TCP/IP Network Administration, 9.3. Network Information Service
TCP/IP Network Administration, 13.2.1. Creating an FTP Server
/etc/halt command : Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
/etc/hosts file
Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
sendmail, 7.3.1. The hostname
sendmail, 18.8. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 6.1. The ifconfig Command
TCP/IP Network Administration, 7.3. Building a Static Routing Table
TCP/IP Network Administration, 9.1.4. NFS Automounter
TCP/IP Network Administration, 9.3. Network Information Service
creating : TCP/IP Network Administration, 3.2. The Host Table
as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
modifying : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
/etc/hosts.allow file : TCP/IP Network Administration, 12.5.1.1. tcpd access control files
/etc/hosts.deny file
Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
TCP/IP Network Administration, 12.5.1.1. tcpd access control files
/etc/hosts.equiv file
Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
Practical UNIX & Internet Security, 24.4.1.5. Changes to the hosts.equiv file
TCP/IP Network Administration, 12.2.5. Secure the r Commands
in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
/etc/hosts.lpd file
Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
TCP/IP Network Administration, 9.2.1.1. LPD security
in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
/etc/inetd : (see inetd daemon)
/etc/inetd.conf file
Practical UNIX & Internet Security, 11.5.3.2. inetd.conf
Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 9.4. A BOOTP Server
editing in tcpd : TCP/IP Network Administration, 12.5.1. wrapper
removing daemons from : TCP/IP Network Administration, 12.3.1. Remove Unnecessary Software
in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
/etc/init program : Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
/etc/init.d directory : TCP/IP Network Administration, 9.1.1. NFS Daemons
autofs script : TCP/IP Network Administration, 9.1.4. NFS Automounter
inetinit script : TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
sendmail script : TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
/etc/inittab : (see inittab program)
/etc/keystore file : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
/etc/logindevperm file : Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
/etc/lp directory : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
/etc/lp/Systems file : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
/etc/motd file : Practical UNIX & Internet Security, 26.2.6. Other Tips
/etc/named.boot file
Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
TCP/IP Network Administration, 8.3.1. The named.boot File
TCP/IP Network Administration, 11.6.3. Cache corruption
TCP/IP Network Administration, C.1. The named Command
TCP/IP Network Administration, C.2. named.boot Configuration Commands
/etc/named.ca file : TCP/IP Network Administration, 11.6.3. Cache corruption
/etc/named.hosts file : TCP/IP Network Administration, 8.3.6. The named.hosts File
/etc/named.local file : TCP/IP Network Administration, 8.3.4. The named.local File
/etc/named.pid file : TCP/IP Network Administration, 11.6.3. Cache corruption
/etc/named.rev file : TCP/IP Network Administration, 8.3.5. The Reverse Domain File
/etc/networks file
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
TCP/IP Network Administration, 7.3. Building a Static Routing Table
TCP/IP Network Administration, 9.3. Network Information Service
as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
/etc/nsswitch.conf
sendmail, 7.3.1. The hostname
sendmail, D.4. L and G Configuration Commands
TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
TCP/IP Network Administration, E.4.2. sendmail Options
/etc/passwd file
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
Practical UNIX & Internet Security, 3.2.1. The /etc/passwd File
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
Practical UNIX & Internet Security, 24.4.1. New Accounts
Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
sendmail, 30.8. Alphabetized F= Flags
TCP/IP Network Administration, 6.3.5. PPP Server Configuration
TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
TCP/IP Network Administration, 9.1.5. NFS Authentication Server
TCP/IP Network Administration, 9.3. Network Information Service
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
TCP/IP Network Administration, 12.2.1. The Shadow Password File
TCP/IP Network Administration, 13.2.1. Creating an FTP Server
+ in : (see NIS)
accounts without passwords : Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
backing up : Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
gecos field : sendmail, 14.2.1. The Full-Name: Header
mail hubs and : sendmail, 6. The Mail Hub and Delivery Agents
new accounts : Practical UNIX & Internet Security, 24.4.1. New Accounts
NFS : Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
protecting : TCP/IP Network Administration, 12.2. User Authentication
in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
trusted users and : sendmail, 14.6. Trusted User
user database class for : sendmail, 33.8. Alphabetized Reference
uucp user and : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
/etc/pcnfsd.conf file : TCP/IP Network Administration, 9.1.5.1. NFS print services
/etc/ppp directory, protecting : TCP/IP Network Administration, A.2. The PPP Daemon
/etc/ppp/options file
TCP/IP Network Administration, 6.3.1. The PPP Daemon
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, A.2. The PPP Daemon
/etc/ppp/options.device file : TCP/IP Network Administration, A.2. The PPP Daemon
/etc/printcap file : TCP/IP Network Administration, 9.2.1. The printcap File
/etc/profile file
Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
/etc/protocols file
TCP/IP Network Administration, 2.7.1. Protocol Numbers
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 9.3. Network Information Service
/etc/publickey file : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
/etc/rc directory
Practical UNIX & Internet Security, 11.5.3.5. System initialization files
Practical UNIX & Internet Security, 17.1.2. Starting the Servers
Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
commenting out services : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
/etc/rc.d/rc.inet1 script : TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
/etc/rc.d/rc.M startup script : TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
services started by : Building Internet Firewalls, 5.8.2.1. How are services managed?
/etc/remote file
Practical UNIX & Internet Security, 10.3.1. aculog File
Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
/etc/renice command
Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
/etc/resolv.conf file
TCP/IP Network Administration, 8.1.1. BIND Configurations
TCP/IP Network Administration, 8.2. Configuring the Resolver
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
/etc/secure/passwd file : Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
/etc/security/passwd.adjunct file : Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
/etc/sendmail.cf : (see sendmail.cf configuration file)
/etc/sendmail.ct file : sendmail, 19.6. Alphabetized m4 Macros
/etc/sendmail.cw file : sendmail, 19.6. Alphabetized m4 Macros
/etc/sendmail/aliases file : Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
/etc/services file
Practical UNIX & Internet Security, 17.1.1. The /etc/services File
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 9.3. Network Information Service
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, 9.7.1. POP Server
TCP/IP Network Administration, 9.7.2. IMAP Server
/etc/shadow file
Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
TCP/IP Network Administration, 12.2.1. The Shadow Password File
/etc/shells file
Practical UNIX & Internet Security, 8.4.2. Changing the Account's Login
sendmail, 18.8. Alphabetized Reference
sendmail, 22.8.4. The /etc/shells file
sendmail, D.1. Sun Enhancements
/etc/ssh_known_hosts file : TCP/IP Network Administration, 12.2.6. Secure Shell
/etc/syslogd
sendmail, 26.1.2. Tuning syslog.conf
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, A.2. The PPP Daemon
TCP/IP Network Administration, A.3. chat
/etc/system file : TCP/IP Network Administration, 5.1. Kernel Configuration
/etc/tty files
Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
sendmail, 18.8. Alphabetized Reference
TCP/IP Network Administration, 6.3.5. PPP Server Configuration
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
/etc/ttys file
Practical UNIX & Internet Security, 8.5.1. Secure Terminals
Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
/etc/ttytab file : Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
/etc/utmp file
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
/etc/uucp directory : Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
/etc/yp/makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
/etc/yp.conf file : TCP/IP Network Administration, 9.3. Network Information Service
in restricted filesystems : Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
Ethernet
Practical UNIX & Internet Security, 16.1. Networking
TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
addresses : TCP/IP Network Administration, 1.4. Network Access Layer
identifying DHCP client by : TCP/IP Network Administration, 9.5.1. dhcpd.conf
keeping records of : TCP/IP Network Administration, 11.4.2. Troubleshooting with the arp Command
addresses for random seeds : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
cables : (see cables, network)
cards, configuring
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
eavesdropping by : Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
fast ports (100 Mbps) : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
FreeBSD device drivers, listed : TCP/IP Network Administration, 5.3.1.3. Devices
interfaces
TCP/IP Network Administration, 5.3.1.3. Devices
TCP/IP Network Administration, 6.1. The ifconfig Command
TCP/IP Network Administration, 6.1.5.2. ARP and trailers
TCP/IP Network Administration, 6.1.5.6. Putting ifconfig in the startup files
LAN : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
networks : TCP/IP Network Administration, 1.4. Network Access Layer
subdividing : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
support in BSD : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
switch : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
Ethernet packet layer : Building Internet Firewalls, 6.3.1.1. Ethernet layer
ethers file
TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
TCP/IP Network Administration, 9.3. Network Information Service
TCP/IP Network Administration, 11.4.2.1. ARP problem case study
Ethers table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
ETRN command (SMTP) : sendmail, 23.6.2.4. Process the queue via ESMTP ETRN
Euler Totient Function : Practical UNIX & Internet Security, 6.4.6.1. How RSA works
eval function
Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
Practical UNIX & Internet Security, 18.2.3.3. Sending mail
evidence, equipment seized as : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
ex editor
Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
Practical UNIX & Internet Security, 11.5.2.4. .exrc
Practical UNIX & Internet Security, 11.5.2.7. Other initializations
EX_CANTCREAT value : sendmail, 36.5.1. EX_CANTCREAT Can't Write a User's File
EX_CONFIG value : sendmail, 36.5.2. EX_CONFIG A Configuration Error
EX_IOERR value : sendmail, 36.5.3. EX_IOERR A System I/O Error Occurred
EX_OK value : sendmail, 36.5.4. EX_OK No Problems, All Was Fine
EX_OSERR value : sendmail, 36.5.5. EX_OSERR A System Resource Error
EX_OSFILE value : sendmail, 36.5.6. EX_OSFILE A Critical System File Failure
EX_SOFTWARE value : sendmail, 36.5.7. EX_SOFTWARE An Internal Software Error
EX_TEMPFAIL value : sendmail, 36.5.8. EX_TEMPFAIL A Recoverable Error
EX_UNAVAILABLE value : sendmail, 36.5.9. EX_UNAVAILABLE A Resource
EX_USAGE value : sendmail, 36.5.10. EX_USAGE A Command Was Used Incorrectly
exceptions : Practical UNIX & Internet Security, C.2. Creating Processes
exclamation mark (!) and mail command : Practical UNIX & Internet Security, 15.1.3. mail Command
exclusive OR (XOR) : Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
exec (in Swatch program) : Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
exec system call
Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
Practical UNIX & Internet Security, 18.2.3.3. Sending mail
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Practical UNIX & Internet Security, 25.2.1.1. Too many processes
ExecCGI option : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
execl system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
execlp system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
executable files, in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
execute permission
Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
Practical UNIX & Internet Security, 5.4. Using Directory Permissions
execv system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
execve system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
execvp system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
exit signal
sendmail, 26.3.1. SIGINT Cleanup and Exit
sendmail, 36.5. sendmail's exit() Status
expanding addresses selectively : sendmail, D.3. K Command's -d switch
expanding macros : sendmail, 31.5. Macro Expansion: $ and $&
expect nothing ('')
TCP/IP Network Administration, 6.3.3. chat
TCP/IP Network Administration, A.3. chat
expect scripting language : TCP/IP Network Administration, A.1.1.1. A sample dip script
expensive delivery agents : sendmail, 30.8. Alphabetized F= Flags
expensive mailers
sendmail, 23.6.1. Periodically with -q
sendmail, 34.8. Alphabetized Reference
expire fields : TCP/IP Network Administration, 12.2.1. The Shadow Password File
expiring
accounts : Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
FTP depositories : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
passwords : Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
exploder lists : sendmail, 25.4. Exploder Mailing Lists
explosions : Practical UNIX & Internet Security, 12.2.1.5. Explosion
EXPN command
sendmail, 22.3.2. SMTP vrfy and expn
sendmail, 22.8.3.5. The PrivacyOptions option
sendmail, 25.7.1. Unscrambling Forwards
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
export laws : Practical UNIX & Internet Security, 26.4.1. Munitions Export
cryptography
Practical UNIX & Internet Security, 6.4.4.1. Use and export of DES
Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
export statement (in gated) : TCP/IP Network Administration, B.10.2. The export Statement
exportfs command : Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
exporting news via NFS : Building Internet Firewalls, 8.5.3.3. Exporting news to clients via
exports file
Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
Practical UNIX & Internet Security, 19.3.2.4. Using Secure NFS
Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
TCP/IP Network Administration, 9.1.5.1. NFS print services
EXPOSED_USER macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
.exrc file : Practical UNIX & Internet Security, 11.5.2.4. .exrc
ext2 filesystem (Linux) : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
Extended SMTP (ESMTP)
sendmail, 4.2. Verbose (-v)
sendmail, 23.9. The qf File Internals
sendmail, 30.8. Alphabetized F= Flags
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
TCP/IP Network Administration, 10.8. Testing sendmail.cf
BODY parameter (ESMTP)
sendmail, 31.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
private extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
extensibility
in monitors : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
of SMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Exterior Gateway Protocol : (see EGP)
exterior routers : Building Internet Firewalls, 4.2.3.4. Exterior router
configuring : Building Internet Firewalls, 9.1.2.2. Exterior Router
merging with bastion host : Building Internet Firewalls, 4.3.3. It's OK to Merge
merging with interior router : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
multiple : Building Internet Firewalls, 4.3.6. It's OK to Use
exterior routing protocols : TCP/IP Network Administration, 7.5. Exterior Routing Protocols
external
clients, and proxying : Building Internet Firewalls, 7.4.5. Internal Versus External Clients
programs on HTTP servers : Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
external data representation (XDR) : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
external databases : (see databases)
External-body message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
extinguishers, fire : (see fires)
extortion : Practical UNIX & Internet Security, 11.3. Authors


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.